@vedran_vukovac Profile picture

Vedran Vukovac

@vedran_vukovac

RTs are not endorsments.

Joined August 2015
Similar User
Slaven Smojver photo

@SlavenSmojver

Instituto Matías Romero photo

@imatiasromero

Dejan Strbad photo

@dstrbad

ambivalentcase🌈 photo

@ambivalentcase

Gordon Neighbour 🦖🌋 🇩🇪 🇪🇺 💙 photo

@CornubiaGeol

TechCentral.ie photo

@techcentral_ie

Vedran Vukovac Reposted

At @bsideszagreb @bojanz is talking about the QUIC protocol and is analyzing the three most used cases with HTTP/3, DoQ and SMB over QUIC. #bsides #bsideszagreb @infigois

helpnetsecurity's tweet image. At @bsideszagreb @bojanz is talking about the QUIC protocol and is analyzing the three most used cases with HTTP/3, DoQ and SMB over QUIC.

#bsides #bsideszagreb @infigois

Vedran Vukovac Reposted

Presented Shadow Stack in Linux userland backed up with Intel CET. Finally, full stack (hardware, kernel, glibc, gcc) is now available!

Here’s @k0st discussing Linux improvements in memory corruption based protections at @bsideszagreb #bsides #bsideszagreb @Divertosecurity @SrceHr

helpnetsecurity's tweet image. Here’s @k0st discussing Linux improvements in memory corruption based protections at @bsideszagreb 

#bsides #bsideszagreb @Divertosecurity @SrceHr


Here’s @k0st discussing Linux improvements in memory corruption based protections at @bsideszagreb #bsides #bsideszagreb @Divertosecurity @SrceHr

helpnetsecurity's tweet image. Here’s @k0st discussing Linux improvements in memory corruption based protections at @bsideszagreb 

#bsides #bsideszagreb @Divertosecurity @SrceHr


Turns out the parent company of Temu has a history of publishing malware into their Android apps Let's dig in:



RL FU!

VX-UNDERGROUND JUST SCORED PERFECT ON OUR MITRE Engenuity ATT&CK® EVALUATIONS. WE ARE THE BEST IN THE WORLD - 420% PROTECTION - 1337% DETECTION - 9001% VISIBILITY - 6969% TECHNIQUE COVERAGE - ∞% REAL TIME DETECTION - 8,446,744,073,709,551,615% OUT OF THE BOX



VX-UNDERGROUND JUST SCORED PERFECT ON OUR MITRE Engenuity ATT&CK® EVALUATIONS. WE ARE THE BEST IN THE WORLD - 420% PROTECTION - 1337% DETECTION - 9001% VISIBILITY - 6969% TECHNIQUE COVERAGE - ∞% REAL TIME DETECTION - 8,446,744,073,709,551,615% OUT OF THE BOX



Vedran Vukovac Reposted

Advisory from @CISAgov, @FBI: cisa.gov/news-events/ne… Do you have info linking CL0P Ransomware Gang or any other malicious cyber actors targeting U.S. critical infrastructure to a foreign government? Send us a tip. You could be eligible for a reward. #StopRansomware

RFJ_USA's tweet image. Advisory from @CISAgov, @FBI:  

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/jenKUZRZwt">cisa.gov/news-events/ne…</a>

Do you have info linking CL0P Ransomware Gang or any other malicious cyber actors targeting U.S. critical infrastructure to a foreign government?

Send us a tip. You could be eligible for a reward.

#StopRansomware

Russia: The entire banking system is at a standstill nationwide because the ISP used for banking communication with the Russian Central Bank is down. Infotel, the ISP, is suspected to have been hacked by a pro-Ukraine group. Sberbank's online services also down.

igorsushko's tweet image. Russia: The entire banking system is at a standstill nationwide because the ISP used for banking communication with the Russian Central Bank is down. Infotel, the ISP, is suspected to have been hacked by a pro-Ukraine group. Sberbank's online services also down.


but what seems to be totally new, someone posted the source code of the XP activator (used for offline phone activating: installation id → confirmation id) couple of hrs ago. forums.mydigitallife.net/threads/is-the…

an0n_r0's tweet image. but what seems to be totally new, someone posted the source code of the XP activator (used for offline phone activating: installation id → confirmation id) couple of hrs ago.

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/bYZab8rMXn">forums.mydigitallife.net/threads/is-the…</a>


In the legendary game Counter-Strike, there is a secret room for Russian players (and there are ~4 million of them) with true news about Ukraine. Finnish journalists found a way to bypass the information blockade of the Russian Federation. They created a whole city called "War"…

TreasChest's tweet image. In the legendary game Counter-Strike, there is a secret room for Russian players (and there are ~4 million of them) with true news about Ukraine. Finnish journalists found a way to bypass the information blockade of the Russian Federation. They created a whole city called "War"…


List of all available and newest CVEs (Common Vulnerabilities and Exposures) with links to their PoC (proof of concept). Data since 1999 (!) github.com/trickest/cve Contributor @trick3st

cyb_detective's tweet image. List of all available and newest CVEs (Common Vulnerabilities and Exposures) with links to their PoC (proof of concept).

Data since 1999 (!)

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/fYYOIFa4Dx">github.com/trickest/cve</a>

Contributor @trick3st


Vedran Vukovac Reposted

Share your experience and knowledge: Call for Papers for Balkan Computer Congress – BalCCon2k23 - System Failure 8|9|10 September 2023 is out! cfp.balccon.org/balccon2k23 Submit and share!!! More info balccon.org #BalCCon #BalCCon2k23 #CFP #Hacking #infosec #community


Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.

an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder &amp; sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.
an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder &amp; sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.
an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder &amp; sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.


Vedran Vukovac Reposted

The struggle 🙃🙃🙃 #cybersecurity #infosec #Memes #BreachForums

Cyberknow20's tweet image. The struggle 🙃🙃🙃

#cybersecurity #infosec #Memes #BreachForums

Windows 10 offline admin creation? 😈 Why not?! Everything happens through built-in offlinelsa and offlinesam DLLs. Official, but not very documented. Enjoy the source code and the compiled exe, as usual: github.com/gtworek/PSBits…



#OnThisDay 1989, Phrack #24 is released which included a document relating to the Enhanced 911 emergency response systems. This document played a major part in series of Secret Service raids, "Operation Sundevil", & arrest of Phrack editor Knight Lightning. #hacking #history

realhackhistory's tweet image. #OnThisDay 1989, Phrack #24 is released which included a document relating to the Enhanced 911 emergency response systems. This document played a major part in series of Secret Service raids, "Operation Sundevil", &amp; arrest of Phrack editor Knight Lightning. #hacking #history
realhackhistory's tweet image. #OnThisDay 1989, Phrack #24 is released which included a document relating to the Enhanced 911 emergency response systems. This document played a major part in series of Secret Service raids, "Operation Sundevil", &amp; arrest of Phrack editor Knight Lightning. #hacking #history


here is the public release of the serviceDetector script (featuring [MS-LSAT] LsarLookupNames() for detecting the installed state and named pipe enumeration for detecting the running state of a service): github.com/tothi/serviceD…



Loading...

Something went wrong.


Something went wrong.